Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
¾ÏÈ£ÈµÈ Æ®·¡ÇÈÀÇ Æ¯¼ºÀ» È°¿ëÇÑ ³×Æ®¿öÅ© ´ÜÀ§ Æ®·¡Ä¿ ŽÁö ±â¹ý |
¿µ¹®Á¦¸ñ(English Title) |
Network-level Tracker Detection Using Features of Encrypted Traffic |
ÀúÀÚ(Author) |
À̵¿±Ù
Áֹοì
ÀÌ¿øÁØ
Dongkeun Lee
Minwoo Joo
Wonjun Lee
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 49 NO. 04 PP. 0314 ~ 0320 (2022. 04) |
Çѱ۳»¿ë (Korean Abstract) |
Á¦3ÀÚ Æ®·¡Ä¿´Â À¥ ÃßÀû ±â¼úÀ» ÅëÇØ ÀÌ¿ëÀÚÀÇ À§Ä¡³ª ¹æ¹® ±â·ÏÀ» Æ÷ÇÔÇÑ ¹Î°¨ Á¤º¸¸¦ ¼öÁýÇÔÀ¸·Î½á µ¥ÀÌÅÍ ÇÁ¶óÀ̹ö½Ã ħÇظ¦ ¾ß±âÇÑ´Ù. ÀÌ¿¡ Æ®·¡Ä¿¸¦ ŽÁöÇÏ¿© Â÷´ÜÇÔÀ¸·Î½á ÀÌ¿ëÀÚ¸¦ º¸È£ÇÏ´Â ¿©·¯ ±â¹ýµéÀÌ Á¦¾ÈµÈ ¹Ù ÀÖÀ¸³ª, À̵éÀº Àú¸¶´Ù Á¾¼Ó¼º°ú ¼º´É Ãø¸é¿¡¼ÀÇ ÇÑ°è°¡ Á¸ÀçÇÑ´Ù. º» ³í¹®Àº ÃÖÃÊ·Î ¾ÏÈ£ÈµÈ Æ®·¡ÇÈÀÇ Æ¯¼ºÀ» È°¿ëÇÑ ³×Æ®¿öÅ© ´ÜÀ§ Æ®·¡Ä¿ ŽÁö ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. º» ±â¹ýÀº Æ®·¡Ä¿°¡ ¹ß»ý½ÃÅ°´Â ¾ÏÈ£ÈµÈ Æ®·¡ÇÈÀÇ ºÎä³Î Á¤º¸¸¦ ±â¹ÝÀ¸·Î Ư¼ºÀ» ÃßÃâÇÏ¿© ºÐ·ù ¸ðµ¨À» ÇнÀ½ÃÅ°°í, ÀÌ¿ëÀÚ ±â±â¿Í ºê¶ó¿ìÀú¿¡ µ¶¸³ÀûÀ¸·Î Àû¿ëµÇ¾î ³×Æ®¿öÅ© ³»ºÎÀÇ Æ®·¡Ä¿ Æ®·¡ÇÈÀ» ³ôÀº Á¤È®µµ·Î ŽÁöÇÔÀ¸·Î½á ³×Æ®¿öÅ©¿¡ ¼ÓÇÑ ÀÌ¿ëÀÚµéÀÇ Á¤º¸ À¯ÃâÀ» ¹æÁöÇÑ´Ù. º» ³í¹®¿¡¼´Â ½ÇÁ¦ Æ®·¡Ä¿ Æ®·¡ÇÈ µ¥ÀÌÅ͸¦ ¼öÁýÇÏ¿© ºÐ¼®ÇÔÀ¸·Î½á ÀÏ¹Ý Æ®·¡ÇÈ°ú ±¸ºÐµÇ´Â Æ®·¡Ä¿ Æ®·¡ÇÈÀÇ Æ¯Â¡À» Ž±¸ÇÏ°í, ¾ÏÈ£ÈµÈ Æ®·¡ÇÈ¿¡¼ ÃßÃâÇÑ Æ¯¼ºÀ» Æ®·¡Ä¿ ŽÁö¿¡ È°¿ëÇÒ ¼ö ÀÖÀ½À» º¸ÀδÙ. |
¿µ¹®³»¿ë (English Abstract) |
Third-party trackers breach users¡¯ data privacy by compiling large amounts of personal data such as location or browsing history through web tracking techniques. Although previous research has proposed several methods to protect the users from web tracking via its detection and blockage, their effectiveness is limited in terms of dependency or performance. To this end, this paper proposes a novel approach to detect trackers at the network level using features of encrypted traffic. The proposed method first builds a classification model based on the features extracted from side-channel information of encrypted traffic generated by trackers. It then prevents leakage of user information by accurately detecting tracker traffic within the network independently from the user¡¯s browsers or devices. We validate the feasibility of utilizing features of encrypted traffic in tracker detection by studying the distinctive characteristics of tracker traffic derived from real-world encrypted traffic analysis. |
Å°¿öµå(Keyword) |
Á¦3ÀÚ Æ®·¡Ä¿
À¥ º¸¾È
µ¥ÀÌÅÍ ÇÁ¶óÀ̹ö½Ã
Àü¼Û °èÃþ º¸¾È
¾ÏÈ£ÈµÈ Æ®·¡ÇÈ ºÐ¼®
third-party tracker
web security
data privacy
transport layer security
encrypted traffic analysis
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|